Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

Google-Workspace-Administrator Leak Questions

Page: 12 / 14
Question 48

A user reached out to the IT department about a Google Group that they own: info@company.com. The group is receiving mail, and each message is also delivered directly to the user's Gmail inbox. The user wants to be able to reply to messages directly from Gmail and have them sent on behalf of the group, not their individual account. Currently, their replies come from their individual account. What would you instruct the user to do?

Options:

A.

Create a new content compliance rule that matches the user's outgoing messages with the group copied, and have it modify the sender to be the group address.

B.

Add the group as an email address that can be sent from within Gmail, and verify that the user has access. They can then choose to reply from the group.

C.

Add the user's individual account as a delegate to the group's inbox. They can then toggle between the accounts and use the Gmail interface on behalf of the group.

D.

Set the group address to be the default sender within the group's posting policies.

Question 49

A user does not follow their sign-in pattern and signs In from an unusual location As an admin, what should you do in response to this alert for this user during this investigation?

Options:

A.

Add Two Factor Authentication to the Domain

B.

First suspend the account and then investigate

C.

Enhance your security alerts for tracking sign-in patterns

D.

Investigate the account for unauthorized activity in the Login and Security Audit Log

Question 50

Your organization has confidential internal content for which only authorized employees are allowed to access Access to this content is managed by using Google Groups Only administrators can create and manage membership You need to provide only the necessary functionality and follow the principle of least privilege What should you do?

Options:

A.

Make a dynamic group so security team members are automatically added

B.

Make a moderated group so all incoming communications can be monitored

C.

Use a group as a collaborative inbox that allows easier sharing

D.

Make a security group to apply access policies

Question 51

A company using Google Workspace has reports of cyber criminals trying to steal usernames and passwords to access critical business data. You need to protect the highly sensitive user accounts from unauthorized access.

What should you do?

Options:

A.

Turn on password expiration.

B.

Enforce 2FA with a physical security key.

C.

Use a third-party identity provider.

D.

Enforce 2FA with Google Authenticator app.

Page: 12 / 14
Exam Name: Google Cloud Certified - Professional Google Workspace Administrator
Last Update: Nov 21, 2024
Questions: 197
Google-Workspace-Administrator pdf

Google-Workspace-Administrator PDF

$28  $80
Google-Workspace-Administrator Engine

Google-Workspace-Administrator Testing Engine

$33.25  $95
Google-Workspace-Administrator PDF + Engine

Google-Workspace-Administrator PDF + Testing Engine

$45.5  $130